Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

200,342 Full-Text Articles 243,163 Authors 47,230,550 Downloads 398 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

200,342 full-text articles. Page 5348 of 5430.

The Arctic Research Of The Composition Of The Troposphere From Aircraft And Satellites (Arctas) Mission: Design, Execution, And First Results, D J. Jacob, J H. Crawford, H Maring, A D. Clarke, J E. Dibb, L K. Emmons, R A. Ferrare, C A. Hostetler, P B. Russell, H B. Singh, A M. Thompson, G E. Shaw, E Mccauley, J R. Pederson, J A. Fisher 2010 Harvard University

The Arctic Research Of The Composition Of The Troposphere From Aircraft And Satellites (Arctas) Mission: Design, Execution, And First Results, D J. Jacob, J H. Crawford, H Maring, A D. Clarke, J E. Dibb, L K. Emmons, R A. Ferrare, C A. Hostetler, P B. Russell, H B. Singh, A M. Thompson, G E. Shaw, E Mccauley, J R. Pederson, J A. Fisher

Faculty of Science - Papers (Archive)

The NASA Arctic Research of the Composition of the Troposphere from Aircraft and Satellites (ARCTAS) mission was conducted in two 3-week deployments based in Alaska (April 2008) and western Canada (June–July 2008). Its goal was to better understand the factors driving current changes in Arctic atmospheric composition and climate, including (1) influx of mid-latitude pollution, (2) boreal forest fires, (3) aerosol radiative forcing, and (4) chemical processes. The June–July deployment was preceded by one week of flights over California (ARCTAS-CARB) focused on (1) improving state emission inventories for greenhouse gases and aerosols, (2) providing observations to test and ...


A Silent Enzootic Of An Orthopoxvirus In Ghana, West Africa: Evidence For Multi-Species Involvement In The Absence Of Widespread Human Disease, Mary G. Reynolds, Darin S. Carroll, Victoria A. Olson, Christine Hughes, Jack Galley, Anna Likos, Joel M. Montgomery, Richard Suu-Ire, Mubarak O. Kwasi, J. Jeffrey Root, Zach Braden, Jason Abel, Cody Clemmons, Russell Regnery, Kevin Karem, Inger K. Damon 2010 USDA/APHIS/WS National Wildlife Research Center

A Silent Enzootic Of An Orthopoxvirus In Ghana, West Africa: Evidence For Multi-Species Involvement In The Absence Of Widespread Human Disease, Mary G. Reynolds, Darin S. Carroll, Victoria A. Olson, Christine Hughes, Jack Galley, Anna Likos, Joel M. Montgomery, Richard Suu-Ire, Mubarak O. Kwasi, J. Jeffrey Root, Zach Braden, Jason Abel, Cody Clemmons, Russell Regnery, Kevin Karem, Inger K. Damon

USDA National Wildlife Research Center - Staff Publications

Human monkeypox has never been reported in Ghana, but rodents captured in forested areas of southern Ghana were the source of the monkeypox virus introduced into the United States in 2003. Subsequent to the outbreak in the United States, 204 animals were collected from two commercial trapping sites in Ghana. Animal tissues were examined for the presence of orthopoxvirus (OPXV) DNA using a real-time polymerase chain reaction, and sera were assayed for antibodies against OPXV. Animals from five genera (Cricetomys , Graphiurus , Funiscirus, and Heliosciurus ) had antibodies against OPXV, and three genera (Cricetomys , Graphiurus , and Xerus) had evidence of OPXV DNA ...


Combined Use Of Frequency-Domain Electromagnetic And Electrical Resistivity Surveys To Delineate Near-Lake Groundwater Flow In The Semi-Arid Nebraska Sand Hills, Usa, John T. Ong, John W. Lane Jr., Vitaly A. Zlotnik, Todd Halihan, Eric A. White 2010 University of Nebraska-Lincoln

Combined Use Of Frequency-Domain Electromagnetic And Electrical Resistivity Surveys To Delineate Near-Lake Groundwater Flow In The Semi-Arid Nebraska Sand Hills, Usa, John T. Ong, John W. Lane Jr., Vitaly A. Zlotnik, Todd Halihan, Eric A. White

Papers in the Earth and Atmospheric Sciences

A frequency-domain electromagnetic (FDEM) survey can be used to select locations for the more quantitative and labor-intensive electrical resistivity surveys. The FDEM survey rapidly characterized the groundwaterflow directions and configured the saline plumes caused by evaporation from several groundwater-dominated lakes in the Nebraska Sand Hills, USA. The FDEM instrument was mounted on a fiberglass cart and towed by an all-terrain vehicle, covering about 25km/day. Around the saline lakes, areas with high electrical conductivity are consistent with the regional and local groundwater flow directions. The efficacy of this geophysical approach is attributed to: the high contrast in electrical conductivity between ...


Geometrical Structure And Analysis Of Association Rule, Rajat Sar 2010 San Jose State University

Geometrical Structure And Analysis Of Association Rule, Rajat Sar

Master's Projects

Association rule mining helps us to identify the association between items from a large transactional data set. It has always been a time consuming process because of repeatedly scanning of the data set. Apriori Algorithm [1] and FP-Tree Algorithm [2] are the two methods to find out the association of items in a large transactional item set. Both the above algorithm works differently (Apriori follows Bottom-Up Approach & FP-Tree follows Top-Down Approach) in order to get the association. Associations of items generated from the above two algorithms can be represented in geometry. The geometrical form of associations is called Simplical Complex ...


Approximate Disassembly, Dhivyakrishnan Radhakrishnan 2010 San Jose State University

Approximate Disassembly, Dhivyakrishnan Radhakrishnan

Master's Projects

For the past two decades, computer viruses have been a constant security threat. A computer virus is a type of malware that may damage computer systems by destroying data, crashing the system, or through other malicious activity. Among the different types of viruses, metamorphic viruses are one of the most difficult to detect since such viruses change their internal structures with each mutation, making signature-based detection infeasible. Many construction kits are available that can be used to easily generate metamorphic strains of any given virus. Previous work has shown that metamorphic viruses are detectable using Hidden Markov Models (HMM). In ...


Improved Software Activation Using Multithreading, Jian Rui Zhang 2010 San Jose State University

Improved Software Activation Using Multithreading, Jian Rui Zhang

Master's Projects

Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed [1]. It is supposed to be quick and simple while simultaneously protecting customer privacy. The most common form of software activation is through the entering of legitimate product serial numbers by users, which sometimes are also known as product keys. This technique is employed by various software, from small shareware programs to large commercial programs such as Microsoft Office. However, software activation based on a serial number appears to be weak, as various cracks for a majority of programs are available and can be ...


Reliable Broadcasting In Vanet, Pat Jangyodsuk 2010 San Jose State University

Reliable Broadcasting In Vanet, Pat Jangyodsuk

Master's Projects

Vehicular Adhoc NETwork (VANET) is a rapid growing wireless ad-hoc network model where the vehicles play the nodes role in a network. Major application of VANET including hazard warning application requires effective broadcast mechanism. Typically, selection of the next relaying hop is the major problem in VANET broadcasting. To get the smallest propagational delay, the number of relaying hops must be minimize. Meanwhile, the transmission reliability must also be preserved. Both of these two constrains must be taken into consideration. However, these two aspects often collide to each other since increasing one of them always result in decreasing of another ...


Geometrical Structure And Analysis Of Association Rules, Sar Rajat 2010 San Jose State University

Geometrical Structure And Analysis Of Association Rules, Sar Rajat

Master's Projects

Association rule mining helps us to identify the association between items from a large transactional data set. It has always been a time consuming process because of repeatedly scanning of the data set. Apriori Algorithm [1] and FP-Tree Algorithm [2] are the two methods to find out the association of items in a large transactional item set. Both the above algorithm works differently (Apriori follows Bottom-Up Approach & FP-Tree follows Top-Down Approach) in order to get the association. Associations of items generated from the above two algorithms can be represented in geometry. The geometrical form of associations is called Simplical Complex ...


Security In Peer-To-Peer Sip Voip, Richa Marwaha 2010 San Jose State University

Security In Peer-To-Peer Sip Voip, Richa Marwaha

Master's Projects

VoIP (Voice over Internet Protocol) is one of the fastest growing technologies in the world. It is used by people all over the world for communication. But with the growing popularity of internet, security is one of the biggest concerns. It is important that the intruders are not able to sniff the packets that are transmitted over the internet through VoIP. Session Initiation Protocol (SIP) is the most popular and commonly used protocol of VoIP. Now days, companies like Skype are using Peer-to-Peer SIP VoIP for faster and better performance. Through this project I am improving an already existing Peer-to-Peer ...


Auto-Generation Of Use Case Controllers, Pushkar Marathe 2010 San Jose State University

Auto-Generation Of Use Case Controllers, Pushkar Marathe

Master's Projects

The thesis is based on the concept of generating machine executable code from UML diagrams. There has been some research done on the same topic but it is mainly focused on class diagrams. My main focus will be on the use case diagrams, and sequence diagrams. Sequence diagrams give us the details of any process in a step-by-step fashion which makes it easier to extract the required information regarding the use cases and the controllers which help us generate the code. The process follows three steps, first being generation of UML diagrams. Secondly, these are converted into XMI (XML Metadata ...


Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale 2010 San Jose State University

Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale

Master's Projects

WiSeNetor is a teaching and a research tool that simulates a scalable wireless sensor network on a single computer, based on the “Spamulator” (Aycock, J., Crawford, H., & deGraaf, R., 2008) which simulates the Internet on a single computer. Routing protocols and network discovery algorithms used in mesh networks and cluster tree networks can be demonstrated using this tool. WiSeNetor contains a network creation module, simulated network devices and it simulates routing algorithms. The network creation module spawns a network according to user specified network type, where the type can be a cluster tree or mesh. In this process, neighbor tables ...


A Framework For Active Learning: Revisited, Yue Chen 2010 San Jose State University

A Framework For Active Learning: Revisited, Yue Chen

Master's Projects

Over the past decade, algorithm visualization tools have been researched and developed to be used by Computer Science instructors to ease students’ learning curve for new concepts. However, limitations such as rigid animation frameworks, lack of user interaction with the visualization created, and learning a new language and environment, have severely reduced instructors’ desire to use such a tool. The purpose of this project is to create a tool that overcomes these limitations. Instructors do not have to get familiar with a new framework and learn another language. The API used to create algorithm animation for this project is through ...


Enhancing Open-Source Localization, Farzana Forhad 2010 San Jose State University

Enhancing Open-Source Localization, Farzana Forhad

Master's Projects

Pootle is a web portal which is designed to be a web translation tool. We can run Pootle like an internet server and run a local copy on an intranet. Pootle has a user friendly interface which ensures better quality and easier translation of projects. Users can log into the Pootle and create their own projects under any language, and they can also add or retrieve any language from any project or any project from any language. Although Pootle has many advantages, it also has its drawbacks, and one of the biggest drawbacks of Pootle is that whatever translation is ...


Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar 2010 San Jose State University

Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar

Master's Projects

Clustering is a popular method to glean useful information from microarray data. Unfortunately the results obtained from the common clustering algorithms are not consistent and even with multiple runs of different algorithms a further validation step is required. Due to absence of well defined class labels, and unknown number of clusters, the unsupervised learning problem of finding optimal clustering is hard. Obtaining a consensus of judiciously obtained clusterings not only provides stable results but also lends a high level of confidence in the quality of results. Several base algorithm runs are used to generate clusterings and a co-association matrix of ...


Open Source Analysis Of Biomedical Figures, David Shao 2010 San Jose State University

Open Source Analysis Of Biomedical Figures, David Shao

Master's Projects

With a selection of biomedical literature available for open access, a natural pairing seems to be the use of open source software to automatically analyze content, in particular, the content of gures. Considering the large number of possible tools and approaches, we choose to focus on the recognition of printed characters. As the problem of optical character recognition (OCR) under rea- sonable conditions is considered to be solved, and as open source software is fully capable of isolating the location of characters and identifying most of them accurately, we instead use OCR as an application area for the relatively recent ...


Parallel Programming Recipes, Thuy C. Nguyenphuc 2010 San Jose State University

Parallel Programming Recipes, Thuy C. Nguyenphuc

Master's Projects

Parallel programming has become vital for the success of commercial applications since Moore’s Law will now be used to double the processors (or cores) per chip every technology generation. The performance of applications depends on how software executions can be mapped on the multi-core chip, and how efficiently they run the cores. Currently, the increase of parallelism in software development is necessary, not only for taking advantage of multi-core capability, but also for adapting and surviving in the new silicon implementation. This project will provide the performance characteristics of parallelism for some common algorithms or computations using different parallel ...


Properties Of The Generalized Laplace Transform And Transport Partial Dynamic Equation On Time Scales, Chris R. Ahrendt 2010 University of Nebraska at Lincoln

Properties Of The Generalized Laplace Transform And Transport Partial Dynamic Equation On Time Scales, Chris R. Ahrendt

Dissertations, Theses, and Student Research Papers in Mathematics

In this dissertation, we first focus on the generalized Laplace transform on time scales. We prove several properties of the generalized exponential function which will allow us to explore some of the fundamental properties of the Laplace transform. We then give a description of the region in the complex plane for which the improper integral in the definition of the Laplace transform converges, and how this region is affected by the time scale in question. Conditions under which the Laplace transform of a power series can be computed term-by-term are given. We develop a formula for the Laplace transform for ...


Detecting Undetectable Computer Viruses, Sujandharan Venkatachalam 2010 San Jose State University

Detecting Undetectable Computer Viruses, Sujandharan Venkatachalam

Master's Projects

Signature-based detection relies on patterns present in viruses and provides a relatively simple and efficient method for detecting known viruses. At present, most anti-virus systems rely primarily on signature detection. Metamorphic viruses are one of the most difficult types of viruses to detect. Such viruses change their internal structure, which provides an effective means of evading signature detection. Previous work has provided a rigorous proof that a fairly simple metamorphic engine can generate viruses that will evade any signature-based detection. In this project, we first implement a metamorphic engine that is provably undetectable—in the sense of signature-based detection. We ...


Western Australian Resource Condition Monitoring Projects 2007-2009, Ceidwen Pengelly, 2010 2010 Department of Agriculture and Food, Western Australia

Western Australian Resource Condition Monitoring Projects 2007-2009, Ceidwen Pengelly, 2010

All other publications

Monitoring the status and trends of our natural resources is the only way we can assess whether the actions that have been implemented are making a difference. The impetus for this resource condition monitoring program (RCM) was the recognition that our monitoring networks, baseline data and data management systems were inadequate to enable quantitative reporting to government, and the community, on the difference their investments in natural resource management were making. It was considered that making a significant investment in raising our ability to report would be a long-lasting legacy of value to the state.


Long-Lasting Phosphorescence In Basi2O2N2:Eu2+ And Ba2Sio4:Eu2+ Phases For X-Ray And Cathode Ray Tubes, Meiyuan Wang, Xia Zhang, Zhendong Hao, Xinguang Ren, Yongshi Luo, Haifeng Zhao, Xiao-Jun Wang, Jiahua Zhang 2010 Chinese Academy of Sciences

Long-Lasting Phosphorescence In Basi2O2N2:Eu2+ And Ba2Sio4:Eu2+ Phases For X-Ray And Cathode Ray Tubes, Meiyuan Wang, Xia Zhang, Zhendong Hao, Xinguang Ren, Yongshi Luo, Haifeng Zhao, Xiao-Jun Wang, Jiahua Zhang

Physics Faculty Publications

We report the long-lasting bluish-green phosphorescence for X-ray or cathode ray tubes in the phosphors with compositions of either Ba2SiO4:0.01Eu2+–xSi3N4 (x=0–1) or 2BaCO3–ySi3N4:0.01Eu2+(y=1/6–1) synthesized by a solid-state reaction. By tuning the Si3N4content, the phosphorescence may originate from Eu2+ in BaSi2O2N2(peaking at 490 nm), Ba2SiO4 (505 nm), and Ba3SiO5 (590 nm) phases. The strong phosphorescence of the Ba2SiO4:Eu2+ phase in 2BaCO3–ySi3N4:0.01Eu2+ is attributed to N substitution for O to generate a shallow trap. In Ba2SiO4:0.01Eu2+–xSi3N4 , however, N prefers reacting with Ba2SiO4 ...


Digital Commons powered by bepress